File tree Expand file tree Collapse file tree 11 files changed +141
-0
lines changed Expand file tree Collapse file tree 11 files changed +141
-0
lines changed Original file line number Diff line number Diff line change @@ -71,3 +71,48 @@ updates:
71
71
- " docker"
72
72
commit-message :
73
73
prefix : " chore(devcontainer)"
74
+
75
+ - package-ecosystem : docker
76
+ directory : /.ci
77
+ schedule :
78
+ interval : daily
79
+
80
+ - package-ecosystem : docker
81
+ directory : /.devcontainer
82
+ schedule :
83
+ interval : daily
84
+
85
+ - package-ecosystem : npm
86
+ directory : /lambdas/functions/ami-housekeeper
87
+ schedule :
88
+ interval : daily
89
+
90
+ - package-ecosystem : npm
91
+ directory : /lambdas/functions/control-plane
92
+ schedule :
93
+ interval : daily
94
+
95
+ - package-ecosystem : npm
96
+ directory : /lambdas/functions/gh-agent-syncer
97
+ schedule :
98
+ interval : daily
99
+
100
+ - package-ecosystem : npm
101
+ directory : /lambdas/functions/termination-watcher
102
+ schedule :
103
+ interval : daily
104
+
105
+ - package-ecosystem : npm
106
+ directory : /lambdas/functions/webhook
107
+ schedule :
108
+ interval : daily
109
+
110
+ - package-ecosystem : npm
111
+ directory : /lambdas/libs/aws-powertools-util
112
+ schedule :
113
+ interval : daily
114
+
115
+ - package-ecosystem : npm
116
+ directory : /lambdas/libs/aws-ssm-util
117
+ schedule :
118
+ interval : daily
Original file line number Diff line number Diff line change 10
10
schedule :
11
11
- cron : ' 25 19 * * 2'
12
12
13
+ permissions :
14
+ contents : read
15
+
13
16
jobs :
14
17
analyze :
15
18
name : Analyze (${{ matrix.language }})
24
27
language : ['javascript-typescript', 'actions']
25
28
26
29
steps :
30
+ - name : Harden the runner (Audit all outbound calls)
31
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
32
+ with :
33
+ egress-policy : audit
34
+
27
35
- name : Checkout repository
28
36
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
29
37
with :
Original file line number Diff line number Diff line change
1
+ # Dependency Review Action
2
+ #
3
+ # This Action will scan dependency manifest files that change as part of a Pull Request,
4
+ # surfacing known-vulnerable versions of the packages declared or updated in the PR.
5
+ # Once installed, if the workflow run is marked as required,
6
+ # PRs introducing known-vulnerable packages will be blocked from merging.
7
+ #
8
+ # Source repository: https://github.com/actions/dependency-review-action
9
+ name : ' Dependency Review'
10
+ on : [pull_request]
11
+
12
+ permissions :
13
+ contents : read
14
+
15
+ jobs :
16
+ dependency-review :
17
+ runs-on : ubuntu-latest
18
+ steps :
19
+ - name : Harden the runner (Audit all outbound calls)
20
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
21
+ with :
22
+ egress-policy : audit
23
+
24
+ - name : ' Checkout Repository'
25
+ uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
26
+ - name : ' Dependency Review'
27
+ uses : actions/dependency-review-action@da24556b548a50705dd671f47852072ea4c105d9 # v4.7.1
Original file line number Diff line number Diff line change 24
24
working-directory : ./lambdas
25
25
26
26
steps :
27
+ - name : Harden the runner (Audit all outbound calls)
28
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
29
+ with :
30
+ egress-policy : audit
31
+
27
32
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
28
33
with :
29
34
persist-credentials : false
Original file line number Diff line number Diff line change 19
19
id-token : write
20
20
21
21
steps :
22
+ - name : Harden the runner (Audit all outbound calls)
23
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
24
+ with :
25
+ egress-policy : audit
26
+
22
27
- name : " Checkout code"
23
28
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
24
29
with :
Original file line number Diff line number Diff line change 28
28
run :
29
29
working-directory : images/${{ matrix.image }}
30
30
steps :
31
+ - name : Harden the runner (Audit all outbound calls)
32
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
33
+ with :
34
+ egress-policy : audit
35
+
31
36
- name : " Checkout"
32
37
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
33
38
with :
Original file line number Diff line number Diff line change 6
6
- v1
7
7
workflow_dispatch :
8
8
9
+ permissions :
10
+ contents : read
11
+
9
12
jobs :
10
13
release :
11
14
name : Release
16
19
id-token : write
17
20
attestations : write
18
21
steps :
22
+ - name : Harden the runner (Audit all outbound calls)
23
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
24
+ with :
25
+ egress-policy : audit
26
+
19
27
- uses : actions/setup-node@49933ea5288caeca8642d1e84afbd3f7d6820020 # v4.4.0
20
28
with :
21
29
node-version : 22
Original file line number Diff line number Diff line change 13
13
name : Semantic Commit Message Check
14
14
runs-on : ubuntu-latest
15
15
steps :
16
+ - name : Harden the runner (Audit all outbound calls)
17
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
18
+ with :
19
+ egress-policy : audit
20
+
16
21
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
17
22
with :
18
23
persist-credentials : false
Original file line number Diff line number Diff line change 10
10
stale :
11
11
runs-on : ubuntu-latest
12
12
steps :
13
+ - name : Harden the runner (Audit all outbound calls)
14
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
15
+ with :
16
+ egress-policy : audit
17
+
13
18
- uses : actions/stale@5bef64f19d7facfb25b37b414482c7164d639639 # v9.1.0
14
19
with :
15
20
stale-issue-message : >
Original file line number Diff line number Diff line change 21
21
container :
22
22
image : hashicorp/terraform:${{ matrix.terraform }}
23
23
steps :
24
+ - name : Harden the runner (Audit all outbound calls)
25
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
26
+ with :
27
+ egress-policy : audit
28
+
24
29
- name : " Checkout"
25
30
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
26
31
with :
90
95
container :
91
96
image : hashicorp/terraform:${{ matrix.terraform }}
92
97
steps :
98
+ - name : Harden the runner (Audit all outbound calls)
99
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
100
+ with :
101
+ egress-policy : audit
102
+
93
103
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
94
104
with :
95
105
persist-credentials : false
@@ -148,6 +158,11 @@ jobs:
148
158
container :
149
159
image : hashicorp/terraform:${{ matrix.terraform }}
150
160
steps :
161
+ - name : Harden the runner (Audit all outbound calls)
162
+ uses : step-security/harden-runner@6c439dc8bdf85cadbbce9ed30d1c7b959517bc49 # v2.12.2
163
+ with :
164
+ egress-policy : audit
165
+
151
166
- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
152
167
with :
153
168
persist-credentials : false
You can’t perform that action at this time.
0 commit comments